Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
Автор: Budaghyan, Lilya Название: Construction and analysis of cryptographic functions ISBN: 3319129902 ISBN-13(EAN): 9783319129907 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Construction and Analysis of Cryptographic Functions
Автор: Micciancio Daniele, Goldwasser Shafi Название: Complexity of Lattice Problems / A Cryptographic Perspective ISBN: 0792376889 ISBN-13(EAN): 9780792376880 Издательство: Springer Рейтинг: Цена: 25149.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Complexity of Lattice Problems: A Cryptographic Perspective is an essential reference for those researching ways in which lattice problems can be used to build cryptographic systems. It will also be of interest to those working in computational complexity, combinatorics, and foundations of cryptography.The book presents a self-contained overview of the state of the art in the complexity of lattice problems, with particular emphasis on problems that are related to the construction of cryptographic functions. Specific topics covered are the strongest known inapproximability result for the shortest vector problem; the relations between this and other computational lattice problems; an exposition of how cryptographic functions can be built and prove secure based on worst-case hardness assumptions about lattice problems; and a study of the limits of non-approximability of lattice problems. Some background in complexity theory, but no prior knowledge about lattices, is assumed.The aim of the authors is to make lattice-based cryptography accessible to a wide audience, ultimately yielding further research and applications. Complexity of Lattice Problems: A Cryptographic Perspective will be valuable to anyone working in this fast-moving field. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.
Автор: Francisco Rodriguez-Henriquez; N.A. Saqib; Arturo Название: Cryptographic Algorithms on Reconfigurable Hardware ISBN: 1441941568 ISBN-13(EAN): 9781441941565 Издательство: Springer Рейтинг: Цена: 18284.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers computational methods, computer arithmetic algorithms, and design improvement techniques for implementing efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author explores reconfigurable hardware design, explains the mathematics involved, and thoroughly reviews state-of-the-art implementation techniques.
Автор: Huang Ke, Mu Yi, Rezaeibagha Fatemeh Название: Design and Analysis of Cryptographic Algorithms in Blockchain ISBN: 1032039329 ISBN-13(EAN): 9781032039329 Издательство: Taylor&Francis Рейтинг: Цена: 13473.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. In addition, it covers surveys of research objects, reviews of cryptographic schemes, lectures and methodologies to practice cryptography.
Автор: Huang Ke, Mu Yi, Rezaeibagha Fatemeh Название: Design and Analysis of Cryptographic Algorithms in Blockchain ISBN: 1032039914 ISBN-13(EAN): 9781032039916 Издательство: Taylor&Francis Рейтинг: Цена: 7348.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book seeks to generalize techniques and experiences in designing and analyzing cryptographic schemes for blockchain. In addition, it covers surveys of research objects, reviews of cryptographic schemes, lectures and methodologies to practice cryptography.
Автор: John F. Dooley Название: A Brief History of Cryptology and Cryptographic Algorithms ISBN: 331901627X ISBN-13(EAN): 9783319016276 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one`s messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.
Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
Автор: Jakub Breier; Xiaolu Hou; Shivam Bhasin Название: Automated Methods in Cryptographic Fault Analysis ISBN: 3030113329 ISBN-13(EAN): 9783030113322 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
Описание: Non-Interactive Zero Knowledge from Sub-exponential DDH.- On the (in)security of ROS.- New Representations of the AES Key Schedule.- Public-Key Cryptography.- Analysing the HPKE Standard.- Tightly-Secure Authenticated Key Exchange, Revisited.- Aggregatable Distributed Key Generation.- Decentralized Multi-Authority ABE for DNFs from LWE.- Isogenies.- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.- One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols.- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.- Delay Encryption.- Post-Quantum Cryptography.- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.- Improved cryptanalysis of UOV and Rainbow.- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.- Post-Quantum Multi-Party Computation.- Lattices.- A 2ⁿ/ -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.- New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.- On the ideal shortest vector problem over random rational primes.- Homomorphic Encryption.- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function.- On the Security of Homomorphic Encryption on Approximate Numbers.- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT.- Symmetric Cryptanalysis.- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.- Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.- A Deeper Look at Machine Learning-Based Cryptanalysis.
Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.
Описание: The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru